<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">gstreamer-plugins-good-1.24.10-2.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:14578-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-12-13T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-12-13T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-12-13T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">gstreamer-plugins-good-1.24.10-2.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the gstreamer-plugins-good-1.24.10-2.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-14578</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GZDF3P2GSSY47IWYHI5OBEEMZAKWSY3E/</URL>
      <Description>E-Mail link for openSUSE-SU-2024:14578-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47530/</URL>
      <Description>SUSE CVE CVE-2024-47530 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47537/</URL>
      <Description>SUSE CVE CVE-2024-47537 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47598/</URL>
      <Description>SUSE CVE CVE-2024-47598 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47599/</URL>
      <Description>SUSE CVE CVE-2024-47599 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47601/</URL>
      <Description>SUSE CVE CVE-2024-47601 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47606/</URL>
      <Description>SUSE CVE CVE-2024-47606 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47613/</URL>
      <Description>SUSE CVE CVE-2024-47613 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47774/</URL>
      <Description>SUSE CVE CVE-2024-47774 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47775/</URL>
      <Description>SUSE CVE CVE-2024-47775 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="gstreamer-plugins-good-1.24.10-2.1">
      <FullProductName ProductID="gstreamer-plugins-good-1.24.10-2.1">gstreamer-plugins-good-1.24.10-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gstreamer-plugins-good-32bit-1.24.10-2.1">
      <FullProductName ProductID="gstreamer-plugins-good-32bit-1.24.10-2.1">gstreamer-plugins-good-32bit-1.24.10-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gstreamer-plugins-good-extra-1.24.10-2.1">
      <FullProductName ProductID="gstreamer-plugins-good-extra-1.24.10-2.1">gstreamer-plugins-good-extra-1.24.10-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gstreamer-plugins-good-extra-32bit-1.24.10-2.1">
      <FullProductName ProductID="gstreamer-plugins-good-extra-32bit-1.24.10-2.1">gstreamer-plugins-good-extra-32bit-1.24.10-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gstreamer-plugins-good-gtk-1.24.10-2.1">
      <FullProductName ProductID="gstreamer-plugins-good-gtk-1.24.10-2.1">gstreamer-plugins-good-gtk-1.24.10-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gstreamer-plugins-good-jack-1.24.10-2.1">
      <FullProductName ProductID="gstreamer-plugins-good-jack-1.24.10-2.1">gstreamer-plugins-good-jack-1.24.10-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gstreamer-plugins-good-jack-32bit-1.24.10-2.1">
      <FullProductName ProductID="gstreamer-plugins-good-jack-32bit-1.24.10-2.1">gstreamer-plugins-good-jack-32bit-1.24.10-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gstreamer-plugins-good-lang-1.24.10-2.1">
      <FullProductName ProductID="gstreamer-plugins-good-lang-1.24.10-2.1">gstreamer-plugins-good-lang-1.24.10-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gstreamer-plugins-good-qtqml-1.24.10-2.1">
      <FullProductName ProductID="gstreamer-plugins-good-qtqml-1.24.10-2.1">gstreamer-plugins-good-qtqml-1.24.10-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gstreamer-plugins-good-qtqml6-1.24.10-2.1">
      <FullProductName ProductID="gstreamer-plugins-good-qtqml6-1.24.10-2.1">gstreamer-plugins-good-qtqml6-1.24.10-2.1</FullProductName>
    </Branch>
    <Relationship ProductReference="gstreamer-plugins-good-1.24.10-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:gstreamer-plugins-good-1.24.10-2.1">gstreamer-plugins-good-1.24.10-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="gstreamer-plugins-good-32bit-1.24.10-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:gstreamer-plugins-good-32bit-1.24.10-2.1">gstreamer-plugins-good-32bit-1.24.10-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="gstreamer-plugins-good-extra-1.24.10-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:gstreamer-plugins-good-extra-1.24.10-2.1">gstreamer-plugins-good-extra-1.24.10-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="gstreamer-plugins-good-extra-32bit-1.24.10-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:gstreamer-plugins-good-extra-32bit-1.24.10-2.1">gstreamer-plugins-good-extra-32bit-1.24.10-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="gstreamer-plugins-good-gtk-1.24.10-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:gstreamer-plugins-good-gtk-1.24.10-2.1">gstreamer-plugins-good-gtk-1.24.10-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="gstreamer-plugins-good-jack-1.24.10-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:gstreamer-plugins-good-jack-1.24.10-2.1">gstreamer-plugins-good-jack-1.24.10-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="gstreamer-plugins-good-jack-32bit-1.24.10-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:gstreamer-plugins-good-jack-32bit-1.24.10-2.1">gstreamer-plugins-good-jack-32bit-1.24.10-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="gstreamer-plugins-good-lang-1.24.10-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:gstreamer-plugins-good-lang-1.24.10-2.1">gstreamer-plugins-good-lang-1.24.10-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="gstreamer-plugins-good-qtqml-1.24.10-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:gstreamer-plugins-good-qtqml-1.24.10-2.1">gstreamer-plugins-good-qtqml-1.24.10-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="gstreamer-plugins-good-qtqml6-1.24.10-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:gstreamer-plugins-good-qtqml6-1.24.10-2.1">gstreamer-plugins-good-qtqml6-1.24.10-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Scout is a web-based visualizer for VCF-files. Open redirect vulnerability allows performing phishing attacks on users by redirecting them to malicious page. /login API endpoint is vulnerable to open redirect attack via next parameter due to absence of sanitization logic. Additionally, due to lack of scheme validation, HTTPS Downgrade Attack can be performed on the users. This vulnerability is fixed in 4.89.</Note>
    </Notes>
    <CVE>CVE-2024-47530</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-32bit-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-extra-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-extra-32bit-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-gtk-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-jack-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-jack-32bit-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-lang-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-qtqml-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-qtqml6-1.24.10-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GZDF3P2GSSY47IWYHI5OBEEMZAKWSY3E/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47530.html</URL>
        <Description>CVE-2024-47530</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1239347</URL>
        <Description>SUSE Bug 1239347</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">GStreamer is a library for constructing graphs of media-handling components. The program attempts to reallocate the memory pointed to by stream-&gt;samples to accommodate stream-&gt;n_samples + samples_count elements of type QtDemuxSample. The problem is that samples_count is read from the input file. And if this value is big enough, this can lead to an integer overflow during the addition. As a consequence, g_try_renew might allocate memory for a significantly smaller number of elements than intended. Following this, the program iterates through samples_count elements and attempts to write samples_count number of elements, potentially exceeding the actual allocated memory size and causing an OOB-write. This vulnerability is fixed in 1.24.10.</Note>
    </Notes>
    <CVE>CVE-2024-47537</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-32bit-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-extra-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-extra-32bit-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-gtk-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-jack-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-jack-32bit-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-lang-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-qtqml-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-qtqml6-1.24.10-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GZDF3P2GSSY47IWYHI5OBEEMZAKWSY3E/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47537.html</URL>
        <Description>CVE-2024-47537</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234414</URL>
        <Description>SUSE Bug 1234414</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been discovered in the qtdemux_merge_sample_table function within qtdemux.c. The problem is that the size of the stts buffer isn't properly checked before reading stts_duration, allowing the program to read 4 bytes beyond the boundaries of stts-&gt;data. This vulnerability reads up to 4 bytes past the allocated bounds of the stts array. This vulnerability is fixed in 1.24.10.</Note>
    </Notes>
    <CVE>CVE-2024-47598</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-32bit-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-extra-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-extra-32bit-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-gtk-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-jack-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-jack-32bit-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-lang-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-qtqml-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-qtqml6-1.24.10-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GZDF3P2GSSY47IWYHI5OBEEMZAKWSY3E/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47598.html</URL>
        <Description>CVE-2024-47598</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234426</URL>
        <Description>SUSE Bug 1234426</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference vulnerability has been discovered in the gst_jpeg_dec_negotiate function in gstjpegdec.c. This function does not check for a NULL return value from gst_video_decoder_set_output_state. When this happens, dereferences of the outstate pointer will lead to a null pointer dereference. This vulnerability can result in a Denial of Service (DoS) by triggering a segmentation fault (SEGV). This vulnerability is fixed in 1.24.10.</Note>
    </Notes>
    <CVE>CVE-2024-47599</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-32bit-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-extra-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-extra-32bit-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-gtk-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-jack-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-jack-32bit-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-lang-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-qtqml-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-qtqml6-1.24.10-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GZDF3P2GSSY47IWYHI5OBEEMZAKWSY3E/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47599.html</URL>
        <Description>CVE-2024-47599</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234427</URL>
        <Description>SUSE Bug 1234427</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference vulnerability has been discovered in the gst_matroska_demux_parse_blockgroup_or_simpleblock function within matroska-demux.c. This function does not properly check the validity of the GstBuffer *sub pointer before performing dereferences. As a result, null pointer dereferences may occur. This vulnerability is fixed in 1.24.10.</Note>
    </Notes>
    <CVE>CVE-2024-47601</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-32bit-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-extra-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-extra-32bit-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-gtk-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-jack-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-jack-32bit-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-lang-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-qtqml-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-qtqml6-1.24.10-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GZDF3P2GSSY47IWYHI5OBEEMZAKWSY3E/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47601.html</URL>
        <Description>CVE-2024-47601</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234428</URL>
        <Description>SUSE Bug 1234428</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">GStreamer is a library for constructing graphs of media-handling components. An integer underflow has been detected in the function qtdemux_parse_theora_extension within qtdemux.c. The vulnerability occurs due to an underflow of the gint size variable, which causes size to hold a large unintended value when cast to an unsigned integer. This 32-bit negative value is then cast to a 64-bit unsigned integer (0xfffffffffffffffa) in a subsequent call to gst_buffer_new_and_alloc. The function gst_buffer_new_allocate then attempts to allocate memory, eventually calling _sysmem_new_block. The function _sysmem_new_block adds alignment and header size to the (unsigned) size, causing the overflow of the 'slice_size' variable. As a result, only 0x89 bytes are allocated, despite the large input size. When the following memcpy call occurs in gst_buffer_fill, the data from the input file will overwrite the content of the GstMapInfo info structure. Finally, during the call to gst_memory_unmap, the overwritten memory may cause a function pointer hijack, as the mem-&gt;allocator-&gt;mem_unmap_full function is called with a corrupted pointer. This function pointer overwrite could allow an attacker to alter the execution flow of the program, leading to arbitrary code execution. This vulnerability is fixed in 1.24.10.</Note>
    </Notes>
    <CVE>CVE-2024-47606</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-32bit-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-extra-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-extra-32bit-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-gtk-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-jack-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-jack-32bit-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-lang-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-qtqml-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-qtqml6-1.24.10-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GZDF3P2GSSY47IWYHI5OBEEMZAKWSY3E/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47606.html</URL>
        <Description>CVE-2024-47606</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234449</URL>
        <Description>SUSE Bug 1234449</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference vulnerability has been identified in `gst_gdk_pixbuf_dec_flush` within `gstgdkpixbufdec.c`. This function invokes `memcpy`, using `out_pix` as the destination address. `out_pix` is expected to point to the frame 0 from the frame structure, which is read from the input file. However, in certain situations, it can points to a NULL frame, causing the subsequent call to `memcpy` to attempt writing to the null address (0x00), leading to a null pointer dereference. This vulnerability can result in a Denial of Service (DoS) by triggering a segmentation fault (SEGV). This vulnerability is fixed in 1.24.10.</Note>
    </Notes>
    <CVE>CVE-2024-47613</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-32bit-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-extra-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-extra-32bit-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-gtk-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-jack-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-jack-32bit-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-lang-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-qtqml-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-qtqml6-1.24.10-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GZDF3P2GSSY47IWYHI5OBEEMZAKWSY3E/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47613.html</URL>
        <Description>CVE-2024-47613</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234447</URL>
        <Description>SUSE Bug 1234447</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been identified in the gst_avi_subtitle_parse_gab2_chunk function within gstavisubtitle.c. The function reads the name_length value directly from the input file without checking it properly. Then, the a condition, does not properly handle cases where name_length is greater than 0xFFFFFFFF - 17, causing an integer overflow. In such scenario, the function attempts to access memory beyond the buffer leading to an OOB-read. This vulnerability is fixed in 1.24.10.</Note>
    </Notes>
    <CVE>CVE-2024-47774</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-32bit-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-extra-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-extra-32bit-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-gtk-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-jack-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-jack-32bit-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-lang-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-qtqml-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-qtqml6-1.24.10-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GZDF3P2GSSY47IWYHI5OBEEMZAKWSY3E/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47774.html</URL>
        <Description>CVE-2024-47774</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234446</URL>
        <Description>SUSE Bug 1234446</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been found in the parse_ds64 function within gstwavparse.c. The parse_ds64 function does not check that the buffer buf contains sufficient data before attempting to read from it, doing multiple GST_READ_UINT32_LE operations without performing boundary checks. This can lead to an OOB-read when buf is smaller than expected. This vulnerability allows reading beyond the bounds of the data buffer, potentially leading to a crash (denial of service) or the leak of sensitive data. This vulnerability is fixed in 1.24.10.</Note>
    </Notes>
    <CVE>CVE-2024-47775</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-32bit-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-extra-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-extra-32bit-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-gtk-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-jack-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-jack-32bit-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-lang-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-qtqml-1.24.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gstreamer-plugins-good-qtqml6-1.24.10-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GZDF3P2GSSY47IWYHI5OBEEMZAKWSY3E/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47775.html</URL>
        <Description>CVE-2024-47775</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234434</URL>
        <Description>SUSE Bug 1234434</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
